Strong Cryptography from Weak Secrets Building Efficient PKE and IBE from Distributed Passwords

نویسندگان

  • Xavier Boyen
  • Céline Chevalier
  • Georg Fuchsbauer
  • David Pointcheval
چکیده

Distributed-password public-key cryptography (DPwPKC) allows the members of a group of people, each one holding a small secret password only, to help a leader to perform the private operation, associated to a public-key cryptosystem. Abdalla et al. recently defined this tool [1], with a practical construction. Unfortunately, the latter applied to the ElGamal decryption only, and relied on the DDH assumption, excluding any recent pairing-based cryptosystems. In this paper, we extend their techniques to support, and exploit, pairing-based properties: we take advantage of pairing-friendly groups to obtain efficient (simulation-sound) zero-knowledge proofs, whose security relies on the Decisional Linear assumption. As a consequence, we provide efficient protocols, secure in the standard model, for ElGamal decryption as in [1], but also for Linear decryption, as well as extraction of several identity-based cryptosystems [6, 4]. Furthermore, we strenghten their security model by suppressing the useless testPwd queries in the functionality.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Building Efficient PKE and IBE from Distributed Passwords

Distributed-password public-key cryptography (DPwPKC) allows the members of a group of people, each one holding a small secret password only, to help a leader to perform the private operation, associated to a public-key cryptosystem. Abdalla et al. recently defined this tool [1], with a practical construction. Unfortunately, the latter applied to the ElGamal decryption only, and relied on the D...

متن کامل

Distributed Public-Key Cryptography from Weak Secrets

We introduce the notion of distributed password-based public-key cryptography, where a virtual high-entropy private key is implicitly de ned as a concatenation of low-entropy passwords held in separate locations. The users can jointly perform private-key operations by exchanging messages over an arbitrary channel, based on their respective passwords, without ever sharing their passwords or reco...

متن کامل

Efficient and Generic Construction of Certification-Based Encryption in the Standard Model Based on the NIZK Proof System

Certificate-based encryption (CBE) is a new public key encryption paradigm which combines traditional PKI-based public-key encryption (PKE) and identity-based encryption (IBE), and preserves some of their most attractive features. CBE provides an efficient implicit certificate mechanism and allows a periodical update of certificate status. It eliminates third-party queries for the certificate s...

متن کامل

Authentication method with impersonal token cards

Traditional methods of user authentication in distributed systems suuer from an important weakness which is due to the low degree of randomness in secrets that human beings can use for identiication. Even though weak secrets (passwords and PINs) are typically not exposed in the clear over the communication lines, they can be discovered with oo-line brute force attacks based on exhaustive trials...

متن کامل

Building Key-Private Public-Key Encryption Schemes

In the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts corresponding to the same message and identity, but generated using different TA master public-keys. This security property has applications in the prevention of traffic analysis in coalition networking environments. In this pap...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010